Unknown Organization (20240244038). METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS

Organization Name

Unknown Organization

Inventor(s)

Ted H. Szymanski of Toronto (CA)

METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240244038 titled 'METHODS TO STRENGTHEN CYBER-SECURITY AND PRIVACY IN A DETERMINISTIC INTERNET OF THINGS

    • Simplified Explanation:**

The patent application describes methods to enhance cyber-security and privacy in a proposed deterministic Internet of Things (IoT) network. The network consists of deterministic packet switches controlled by a low-complexity software-defined networking (SDN) control-plane, enabling the transport of deterministic traffic flows with guaranteed rates of transmission.

    • Key Features and Innovation:**

- Utilizes deterministic packet switches and SDN control-plane for enhanced cyber-security and privacy in IoT networks. - Configures interference-free deterministic virtual networks (DVNs) with deterministic traffic flows (DTFs) for secure data transmission. - Implements deterministic periodic schedules for authorized data transmission over fiber-optic links, ensuring immunity to congestion, interference, and denial-of-service attacks. - Employs low-complexity private-key encryption/decryption units at source nodes, destination nodes, and switches for secure data transmission. - Configures long private keys and very long keys for encryption/decryption units to achieve high levels of security. - Uses a new serial permutation unit for exceptional security and high throughputs in FPGA hardware.

    • Potential Applications:**

- Secure data transmission in IoT networks. - Protection against cyber-attacks and unauthorized access. - Enhanced privacy and confidentiality in IoT communication.

    • Problems Solved:**

- Addressing cyber-security vulnerabilities in IoT networks. - Ensuring secure and private data transmission. - Detecting and preventing unauthorized transmissions.

    • Benefits:**

- Enhanced cyber-security and privacy in IoT networks. - Immunity to congestion, interference, and denial-of-service attacks. - Secure and guaranteed data transmission rates. - Efficient energy use with low-complexity encryption/decryption units.

    • Commercial Applications:**

Secure IoT communication technology for industries such as healthcare, finance, and smart cities.

    • Questions about IoT Security:**

1. How does the proposed deterministic IoT network enhance cyber-security and privacy? 2. What are the key features of the deterministic packet switches and SDN control-plane in ensuring secure data transmission in IoT networks?


Original Abstract Submitted

methods to strengthen the cyber-security and privacy in a proposed deterministic internet of things (iot) network are described. the proposed deterministic iot consists of a network of simple deterministic packet switches under the control of a low-complexity ‘software defined networking’ (sdn) control-plane. the network can transport ‘deterministic traffic flows’ (dtfs), where each dtf has a source node, a destination node, a fixed path through the network, and a deterministic or guaranteed rate of transmission. the sdn control-plane can configure millions of distinct interference-free ‘deterministic virtual networks’ (d)vns) into the iot, where each dvn is a collection of interference-free dtfs. the sdn control-plane can configure each deterministic packet switch to store several deterministic periodic schedules, defined for a scheduling-frame which comprises f time-slots. the schedules of a network determine which dtfs are authorized to transmit data over each fiber-optic link of the network. these schedules also ensure that each dtf will receive a deterministic rate of transmission through every switch it traverses, with full immunity to congestion, interference and denial-of-service (dos) attacks. any unauthorized transmissions by a cyber-attacker can also be detected quickly, since the schedules also identify unauthorized transmissions. each source node and destination node of a dtf, and optionally each switch in the network, can have a low-complexity private-key encryption/decryption unit. the sdn control-plane can configure the source and destination nodes of a dtf, and optionally the switches in the network, to encrypt and decrypt the packets of a dtf using these low-complexity encryption/decryption units. to strengthen security and privacy and to lower the energy use, the private keys can be very large, for example several thousands of bits. the sdn control-plane can configure each dtf to achieve a desired level of security well beyond what is possible with exitsing schemes such as aes, by using very long keys. the encryption/decryption units also use a new serial permutation unit the very low hardware cost, which allows for exceptional security and very-high throughputs in fpga hardware.